From Mageia wiki
Jump to: navigation, search

MGASA-2012-0182

Date: July 29th, 2012
Affected releases: 2


Description:
Updated mosh package fixes security vulnerability:

Mosh versions 1.2 and earlier allow an application to cause the
mosh-server to consume large amounts of CPU time with a short ANSI
escape sequence. In addition, a malicious mosh-server can cause the
mosh-client to consume large amounts of CPU time with a short ANSI
escape sequence. This arises because there was no limit on the value
of the "repeat" parameter in some ANSI escape sequences, so even
large and nonsensical values would be interpreted by Mosh's terminal
emulator (CVE-2012-2385).


Updated Packages:
mosh-1.1.3-1.1.mga2


References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2385
http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082850.html
https://bugs.mageia.org/show_bug.cgi?id=6594